While ransomware on macOS remains a small and unlikely threat, SentinelOne researchers believe that a new malware family dubbed "macOS.NotLockBit" has made advancements that could emerge as a credible threat to Apple computers.SentinelOne researchers said in an Oct. 22 blog post that ransomware threats for Macintosh computers were mostly in the proof-of-concept (PoC) stage and largely incapable of succeeding in corrupting a system.SentinelOne gave it the name macOS.NotLockBit because it’s from a different threat actor that's apparently appropriating the LockBit name, and earlier research such as the blog posted by TrendMicro last week did not give it a specific name. Interestingly enough, the SentinelOne researchers noted that LockBit was involved in one of the more credible previous ransomware attempts on macOS to date.“As stated in our earlier research, previous attempts at ransomware on macOS were never really genuine threats to users, and there are no recorded cases of any organizations paying out a ransom to a threat actor to unlock or retrieve their own files,” explained Phil Stokes, senior researcher at SentinelLabs. Stokes said there are at least four notable points about this threat:Fully developed infrastructure: Unlike other PoCs, this malware was backed by a fully developed infrastructure for exfiltrating and storing victim data, a necessary step in any large-scale campaign where attackers expect to have to deal with large amounts of data from multiple victims. This suggests the attacker has serious ambitions. Asymmetric encryption: The malware has a functional asymmetric encryption scheme (unlike say,
EvilQuest/ThiefQuest, which used an amateurish symmetric encryption making it possible to decrypt files without aid from the attacker), meaning that it would be impossible to decrypt locked files without the attacker’s aid. Sophisticated diversion techniques: The malware developer used a LockBit “wallpaper” in an attempt to either (or both) raise their own credibility to increase chances of getting a payout and/or misattribute attacks to known groups as a means of diverting attention from law enforcement. Indicators of ongoing development: The threat seems to have been discovered before being distributed in an active campaign. However, since the most recent samples SentinelOne discovered date back to May 2024, it’s a reasonable assumption that further work has been done in the interim, and it may not be long before we see the next stage of development from this threat actor
EvilQuest/ThiefQuest, which used an amateurish symmetric encryption making it possible to decrypt files without aid from the attacker), meaning that it would be impossible to decrypt locked files without the attacker’s aid.